exam questions

Exam PCNSA All Questions

View all questions & answers for the PCNSA exam

Exam PCNSA topic 1 question 160 discussion

Actual exam question from Palo Alto Networks's PCNSA
Question #: 160
Topic #: 1
[All PCNSA Questions]

Refer to the exhibit. A web server in the DMZ is being mapped to a public address through DNAT.

Which Security policy rule will allow traffic to flow to the web server?

  • A. Untrust (any) to DMZ (10.1.1.100), web browsing - Allow
  • B. Untrust (any) to Untrust (1.1.1.100), web browsing - Allow
  • C. Untrust (any) to Untrust (10.1.1.100), web browsing - Allow
  • D. Untrust (any) to DMZ (1.1.1.100), web browsing - Allow
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Surfside92
Highly Voted 2 years, 4 months ago
Selected Answer: D
The given answer D is correct - my previous answers are wrong. There's 2 policies at play here - the security and NAT policy. I thought the question related to the NAT policy - it doesn't - it asks about the security policy.
upvoted 8 times
...
mirko1976
Most Recent 1 week, 5 days ago
Selected Answer: A
The correct answer is: A. Untrust (any) to DMZ (10.1.1.100), web browsing - Allow Explanation: 1. Destination NAT (DNAT) is configured to map 1.1.1.100 (public IP) to 10.1.1.100 (private IP of the web server in DMZ). 2. When external users from the Untrust zone (e.g., 1.1.1.250) try to access the web server using 1.1.1.100, the firewall translates this destination to 10.1.1.100. 3. Security policies always evaluate traffic after NAT has been applied. So, the destination in the security policy should match 10.1.1.100. 4. The correct security policy should allow traffic from Untrust (any) to DMZ (10.1.1.100). When configuring security policies for Destination NAT (DNAT) on a Palo Alto firewall: - The pre-NAT IP is used in NAT rules. - The post-NAT IP is used in security policies.
upvoted 1 times
...
de7cdfd
3 months ago
Selected Answer: D
D is correct
upvoted 1 times
...
Jallic
4 months, 3 weeks ago
Selected Answer: B
I believe the answer here is B, as the NAT is done on the untrusted side therefore the security policy has to untrusted (any) to untrusted (DNAT), within the NAT configuration the real address would be mapped and so would the DMZ zone.
upvoted 1 times
...
Russ_A7x
11 months, 3 weeks ago
Pre IP > post zone for incoming traffic
upvoted 1 times
...
Kvant
1 year, 6 months ago
https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping#ide8f6a4b3-f875-4855-acb5-5fd9ad918d04
upvoted 1 times
...
Grace_Shu
1 year, 8 months ago
Answer is D: Zone: After NAT Address: Before NAT
upvoted 2 times
...
Aaron_0801
1 year, 9 months ago
Answer is D "It then evaluates and applies any security policies that match the packet based on the original (pre-NAT) source and destination addresses, but the post-NAT zones". https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-policy-rules/nat-policy-overview#:~:text=It%20then%20evaluates%20and%20applies%20any%20security%20policies%20that%20match%20the%20packet%20based%20on%20the%20original%20(pre%2DNAT)%20source%20and%20destination%20addresses%2C%20but%20the%20post%2DNAT%20zones
upvoted 2 times
...
nolox
1 year, 10 months ago
Selected Answer: D
As @Surfside92 mentioned, according to CBT Nuggets video (watched the same) answer should be B. However, @ntir shared the link which shows literally this situation. I would go with D because it's from PA site.
upvoted 1 times
...
ntir
2 years ago
D https://docs.paloaltonetworks.com/pan-os/9-1/pan-os-admin/networking/nat/nat-configuration-examples/destination-nat-exampleone-to-one-mapping#ide8f6a4b3-f875-4855-acb5-5fd9ad918d04
upvoted 1 times
...
BeforeScope
2 years, 1 month ago
answer D
upvoted 1 times
...
Oteslar
2 years, 2 months ago
Selected Answer: A
the key in this question is Security policy rule, the traffic will flow through the firewall within two rules, Nat rule policy+Security rule policy.
upvoted 2 times
...
PunkSp
2 years, 2 months ago
Selected Answer: A
Must be A. You create the rule to the internal ip.
upvoted 2 times
...
Surfside92
2 years, 4 months ago
Selected Answer: C
I've labbed this using a cbtnuggets video. Within the rule you specify the dmz server global ip address and actual local address
upvoted 1 times
Surfside92
2 years, 4 months ago
Sorry - meant answer b -
upvoted 1 times
...
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago